Background: One of the most predominant periodontal diseases is the plaque induced gingivitis. For the past 20 years, super-oxidized solutions have be..
Three mesoporous silica with different functional group were prepared by one-step synthesis based on the simultaneous hydrolysis and condensation of sodium silicate with organo - silane in the presence of template surfactant polydimethylsiloxane - polyethyleneoxide (PDMS - PEO). The prepared materials were characterized by Fourier transform infrared spectroscopy (FTIR), thermogravimetric analysis (TGA), atomic force microscopy (AFM) and nitrogen adsorption/desorption experiments. The results indicate that the preparation of methyl and phenyl functionalized silica were successful and the mass of methyl and phenyl groups bonded to the silica structure are 15, 38 mmol per gram silica. The average diameter of the silica particles are 103.51,
... Show MoreA new derivatives of Schiff bases connected with 5H-thiazolo[3,4-b][1,3,4]thiadiazole ring 5a-c were prepared via many reactions starting by treating 1,4-phenylene diamine 1 with chloroacetylchloride to prepared compound 2, then reaction with p-hydroxybenzaldehyde to synthesize compound 3 then, this was reacted with thioglycolic acid and thiosemicarazide to giveN,N-(1.4-phenylene)bis(2-(4-(2-amino-5Hthiazolo[4,3-b][1,3,4]thiadiazol-5-yl)phenoxy)acetamide) 4. Compound 4 was treated with different aromatic aldehydes to give a new derivatives of Schiff bases containing 5H-thiazolo[3,4-b][1,3,4]thiadiazole ring 5a-c. The synthesized compounds were characterized using FTIR spectrophotometer and 1H NMR spectroscopy and the biological activity of
... Show MoreThe study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.
The purpose of my thesis is to synthesis two new bidentate ligands which were used to prepare series of metal complexes by reacting the ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) Succinyl chloride was used as starting material to synthesis two bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline (L1) and (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that are: (L1) = N1,N4-bis (4-chloro phenyl ) succinamide (L2) =N1,N4-bis(4-acetylphenyl)succinamide The new ligands were characterize by using spectroscopic study (Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra
... Show MoreObjective: This in vitro study is aimed to compare and evaluate the cyclic fatigue of four varying NiTi rotary instrumentation systems. Method: In this study, four types of rotary files were used in four groups (10 files for each group), namely, Group A: Wave One Gold; Group B: AF Blue R3; Group C: One Curve; Group D: F6 SkyTaper. These groups were evaluated by a cyclic fatigue apparatus to measure cyclic fatigue resistance within the artificial metallic simulating canal that has a 60 angle of curvature, the curvature radius was 5 mm, whereas the inner diameter of the canal was 1.5 mm. All the files were rotated in artificial canals until they fracture. The resistance to cyclic fatigue was determined by counting the number of cycles to frac
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More